27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

'USERNAME' parameter of the 'login.php' script is not properly sanitized. A remote,<br />

unauthenticated attacker could exploit this to execute arbitrary SQL queries.<br />

Solution: Upgrade to Symantec Web Gateway version 4.5.0.376 or later.<br />

CVE-2010-0115<br />

Symantec Web Gateway forget.php Blind SQL Injection (SYM11-008)<br />

<strong>PVS</strong> ID: 5991 FAMILY: CGI RISK: HIGH NESSUS ID:55629<br />

Description: Synopsis : \n\nThe web security application running on the remote host has a SQL injection<br />

vulnerability.\n\nFor your information, the observed version of Symantec Web Gateway<br />

installed on the remote host : \n %L \n\nVersions of Symantec Web Gateway 4.5.x are<br />

potentially affected by a SQL injection vulnerability. Input to the 'username' parameter of<br />

the 'forget.php' script is not properly sanitized. A remote, unauthenticated attacker could<br />

exploit this to execute arbitrary SQL queries.<br />

Solution: Upgrade to Symantec Web Gateway version 5.0.1 or later.<br />

CVE-2011-0549<br />

Safari < 5.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5992 FAMILY: Web Clients RISK: HIGH NESSUS ID:55369<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe remote host has Safari installed. For your information, the observed version<br />

of Safari is %L.\n\nVersions of Safari earlier than 5.1 are potentially affected by several<br />

issues in the following component :\n\n - CF<strong>Network</strong>\n\n - ColorSync\n\n -<br />

CoreFoundation\n\n - CoreGraphics\n\n - International Components for Unicode\n\n -<br />

ImageIO\n\n - libxslt\n\n - libxml\n\n - Safari\n\n - WebKit<br />

Solution: Upgrade to Safari 5.1 or later.<br />

CVE-2011-1797<br />

Apple iOS < 4.2.10 / 4.3.5 Data <strong>Security</strong> Certificate Verification Vulnerability<br />

<strong>PVS</strong> ID: 5993 FAMILY: Mobile Devices<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a security bypass vulnerability.\n\nThe<br />

remote host is an iPhone, iPod Touch, or iPad running iOS. For your information, the<br />

observed version of iOS is : \n %L \n\nVersions of iOS 3.0 through 4.3.4 for iPhone, 3.1<br />

through 4.3.4 for the iPod touch, and 3.2 through 4.3.4 for the iPad are potentially affected<br />

by a security bypass vulnerability due to a certificate chain validation issue in the handling<br />

of X.509 certificates.<br />

Solution: Upgrade to iOS 4.2.10, 4.3.5, or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1632

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!